{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:04:32Z","timestamp":1743087872592,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642001987"},{"type":"electronic","value":"9783642001994"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00199-4_6","type":"book-chapter","created":{"date-parts":[[2009,3,26]],"date-time":"2009-03-26T13:26:36Z","timestamp":1238073996000},"page":"60-74","source":"Crossref","is-referenced-by-count":2,"title":["Architectural Refinement and Notions of Intransitive Noninterference"],"prefix":"10.1007","author":[{"given":"Ron","family":"van der Meyden","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"3\/4","key":"6_CR1","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1504\/IJES.2006.014859","volume":"2","author":"J. Alves-Foss","year":"2006","unstructured":"Alves-Foss, J., Harrison, W.S., Oman, P., Taylor, C.: The MILS architecture for high-assurance embedded systems. International Journal of Embedded Systems\u00a02(3\/4), 239\u2013247 (2006)","journal-title":"International Journal of Embedded Systems"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Barbosa, M.A.: A refinement calculus for software components and architectures. ACM SIGSOFT Software Engineering Notes, 30(5) (September 2005)","DOI":"10.1145\/1095430.1081767"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Bell, D.E., La Padula, L.J.: Secure computer system: unified exposition and multics interpretation. Technical Report ESD-TR-75-306, Mitre Corporation, Bedford, M.A. (March 1976)","DOI":"10.21236\/ADA023588"},{"key":"6_CR4","unstructured":"Bibighaus, D.: Applying the doubly labeled transition system to the refinement paradox. PhD thesis, Naval Postgraduate School, Monterey (2006)"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Bossi, A., Focardi, R., Piazza, C., Rossi, S.: Refinement operators and information flow security. In: Proc. Int. Conf. on Software Engineering and Formal Methods, pp. 44\u201353 (2003)","DOI":"10.1109\/SEFM.2003.1236206"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Security policies and security models. In: Proc. IEEE Symp. on Security and Privacy, Oakland, pp. 11\u201320 (1982)","DOI":"10.1109\/SP.1982.10014"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Graham-Cunning, J., Sanders, J.: On the refinement of noninterference. In: Proc. IEEE Computer Security Foundations Workshop, pp. 35\u201342 (1991)","DOI":"10.1109\/CSFW.1991.151567"},{"issue":"2","key":"6_CR8","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/TSE.1987.226478","volume":"SE-13","author":"J.T. Haigh","year":"1987","unstructured":"Haigh, J.T., Young, W.D.: Extending the noninterference version of MLS for SAT. IEEE Trans. on Software Engineering\u00a0SE-13(2), 141\u2013150 (1987)","journal-title":"IEEE Trans. on Software Engineering"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Jacob, J.: On the derivation of secure components. In: Proc. IEEE Symp. on Security and Privacy, pp. 242\u2013247 (1989)","DOI":"10.1109\/SECPRI.1989.36298"},{"key":"6_CR10","volume-title":"Secure Systems Development with UML","author":"J. J\u00fcrjens","year":"2005","unstructured":"J\u00fcrjens, J.: Secure Systems Development with UML. Springer, Heidelberg (2005)"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Mantel, H.: Preserving information flow properties under refinement. In: Proc. IEEE Symp. Security and Privacy, pp. 78\u201391 (2001)","DOI":"10.1109\/SECPRI.2001.924289"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"van der Meyden, R.: A comparison of semantic models of intransitive noninterference (submitted for publication) (December 2007), http:\/\/www.cse.unsw.edu.au\/~meyden","DOI":"10.1007\/978-3-540-75227-1_16"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"van\u00a0der Meyden, R.: What, indeed, is intransitive noninterference? (submitted for publication, copy at http:\/\/www.cse.unsw.edu.au\/~meyden \u2013 an extended abstract of this paper appears in Proc. ESORICS 2007) (January 2008)","DOI":"10.1007\/978-3-540-74835-9_16"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Moriconi, M., Qian, X.: Correctness and composition of software architectures. In: Proc. 2nd ACM SIGSOFT Symposium on Foundations of Software Engineering, pp. 164\u2013174 (1994)","DOI":"10.1145\/195274.195403"},{"key":"6_CR15","unstructured":"Moriconi, M., Qian, X., Riemenschneider, R.A., Gong, L.: Secure software architectures. In: Proc. IEEE Symp. on Security and Privacy, pp. 884\u2013893 (1997)"},{"issue":"4","key":"6_CR16","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1109\/32.385972","volume":"21","author":"M. Moriconi","year":"1995","unstructured":"Moriconi, M., Qian, X., Riemenschneider, R.A.: Correct architecture refinement. IEEE Transactions on Software Engineering\u00a021(4), 356\u2013372 (1995)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"O\u2019Halloran, C.: Refinement and confidentiality. In: Fifth Refinement Workshop, pp. 119\u2013139. British Computer Society (1992)","DOI":"10.1007\/978-1-4471-3550-0_7"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Philipps, J., Rumpe, B.: Refinement of information flow architectures. In: Proc. 1st IEEE Int. Conf. on Formal Engineering Methods, pp. 203\u2013212 (1997)","DOI":"10.1109\/ICFEM.1997.630427"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Roscoe, A.W., Goldsmith, M.H.: What is intransitive noninterference? In: IEEE Computer Security Foundations Workshop, pp. 228\u2013238 (1999)","DOI":"10.1109\/CSFW.1999.779776"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Roscoe, A.W.: CSP and determinism in security modelling. In: Proc. IEEE Symp. on Security and Privacy, pp. 114\u2013221 (1995)","DOI":"10.1109\/SECPRI.1995.398927"},{"key":"6_CR21","unstructured":"Rushby, J.: Noninterference, transitivity, and channel-control security policies. Technical Report CSL-92-02, SRI International (December 1992)"},{"issue":"7","key":"6_CR22","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MC.1983.1654443","volume":"16","author":"J.M. Rushby","year":"1983","unstructured":"Rushby, J.M., Randell, R.: A distributed secure system. IEEE Computer\u00a016(7), 55\u201367 (1983)","journal-title":"IEEE Computer"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Seehusen, F., Stolen, K.: Information flow property preserving transformation of UML interaction diagrams. In: Proc. ACM symposium on access control models and technologies, pp. 150\u2013159 (2006)","DOI":"10.1145\/1133058.1133080"},{"key":"6_CR24","unstructured":"Vanfleet, W.M., Beckworth, R.W., Calloni, B., Luke, J.A., Taylor, C., Uchenick, G.: MILS:architecture for high assurance embedded computing. Crosstalk: The Journal of Defence Engineering, 12\u201316 (August 2005)"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Zhou, J., Alves-Foss, J.: Architecture-based refinements for secure computer system design. In: Proc. Policy, Security and Trust (November 2006)","DOI":"10.21236\/ADA459287"}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Software and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00199-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T18:00:15Z","timestamp":1739037615000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00199-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642001987","9783642001994"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00199-4_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}